What the Zuck!
Evangelizing About the Erosion of Privacy


What the Zuck!
Evangelizing About the Erosion of Privacy

Defensive Resources


VPN

A Virtual Private Network (VPN) is the number one defensive tool against Man-in-the-Middle attacks, HTTPS spoofing (by employers), and location tracking. This is the most important item in your toolkit.
VPN

A Virtual Private Network (VPN) is the number one defensive tool against Man-in-the-Middle attacks, HTTPS spoofing (by employers), and location tracking. This is the most important item in your toolkit.
Changing Online Habits

Any software or hardware solution isn't going to solve a behavior problem. There needs to be changes in habits in order for privacy to be maintained.
Changing Online Habits

Any software or hardware solution isn't going to solve a behavior problem. There needs to be changes in habits in order for privacy to be maintained.
Brax.Me - Social Media with No Footprint

There is no defense if you plaster your personal information permanently on the Internet. The Internet is unforgiving with its immense capacity to remember everything. So a planned approach of hiding your Internet footprint is an essential part of a defensive strategy.
Brax.Me - Social Media with No Footprint

There is no defense if you plaster your personal information permanently on the Internet. The Internet is unforgiving with its immense capacity to remember everything. So a planned approach of hiding your Internet footprint is an essential part of a defensive strategy.
Password Tips

Learn how to make your passwords resistant to hacking.
Password Tips

Learn how to make your passwords resistant to hacking.
Password Manager

Using a Password Manager to keep your passwords unique.
Password Manager

Using a Password Manager to keep your passwords unique.
How Big is Your Password Haystack?

Understanding how to keep hackers at bay with password complexity
How Big is Your Password Haystack?

Understanding how to keep hackers at bay with password complexity
TOR Browser

Learn about the unique capabilities of the TOR Browser
TOR Browser

Learn about the unique capabilities of the TOR Browser
TOR Wifi Router

Learn about the unique capabilities of the TOR Router
TOR Wifi Router

Learn about the unique capabilities of the TOR Router
Encrypted Email

Learn about options relating to encrypted email
Encrypted Email

Learn about options relating to encrypted email
Browser Isolation

Learn how to defeat the data collection attempts of Google and Facebook using supercookies using a technique I coined as browser isolation.
Browser Isolation

Learn how to defeat the data collection attempts of Google and Facebook using supercookies using a technique I coined as browser isolation.
Duckduckgo

Change your search engine to Duckduckgo.com and begin to hide your search results. You can also use Startpage.com. Startpage.com is a proxy search engine. It searches Google for you but anonymizes your identity.
Duckduckgo

Change your search engine to Duckduckgo.com and begin to hide your search results. You can also use Startpage.com. Startpage.com is a proxy search engine. It searches Google for you but anonymizes your identity.
Spotting HTTPS Snooping

How to Spot if there's an HTTPS Man-in-the-Middle.
Spotting HTTPS Snooping

How to Spot if there's an HTTPS Man-in-the-Middle.
Preventing Wifi Hacking

How to keep your Wifi Safe.
Preventing Wifi Hacking

How to keep your Wifi Safe.
Disabling Intel AMT

How to disable Intel AMT on Windows.
Disabling Intel AMT

How to disable Intel AMT on Windows.
Disinformation as Defense

How to use disinformation to confuse the surveillance machines.
Disinformation as Defense

How to use disinformation to confuse the surveillance machines.
Transacting in Crypto

Using Bitcoin to remove your transaction footprint.
Transacting in Crypto

Using Bitcoin to remove your transaction footprint.
Burner Phones

Do Burner Phones work to protect your privacy?
Burner Phones

Do Burner Phones work to protect your privacy?
Which Phones are Safe?

Which is safer, iOS or Android?
Which Phones are Safe?

Which is safer, iOS or Android?
Best Antivirus

Which is the best Antivirus?
Best Antivirus

Which is the best Antivirus?
Preventing Mic Eavesdropping

How to stop eavesdropping of your computer microphone
Preventing Mic Eavesdropping

How to stop eavesdropping of your computer microphone
Preventing DNS Leaks on Windows 10

DNS Leaks on Windows 10
Preventing DNS Leaks on Windows 10

DNS Leaks on Windows 10
Blocking Cookies and Fingerprinting

Learn how to defend yourself against cookies that abuse your data.
Blocking Cookies and Fingerprinting

Learn how to defend yourself against cookies that abuse your data.
Buy VPN Bytz VPN - with Built-in TOR Routing
by Rob Braxman
Buy Now


Buy VPN

Copyright 2018 Rob Braxman - All Rights Reserved